Jacob Mannon
Forum Replies Created
-
AuthorPosts
-
Jacob Mannon
ParticipantThis verse reminds me of Isaiah, “For my thoughts are not your thoughts, nor are your ways My ways, says the Lord. For as the heavens are higher than the earth, so are My ways higher than your ways, and My thoughts than your thoughts” (New King James Version 2020, Isaiah, 55:8-9). We need to seek the righteousness of God and not the ways of the world. When we look around us, we see clearly that the world is corrupt, and its people bring nothing but death and sin upon each other. It is when we follow God’s will because His ways are indeed higher than our ways that we find peace in His presence through our King Jesus.
-Jacob.
Jacob Mannon
ParticipantBraden,
I think you provided an excellent combination of examples. There is not any one particular thing a company can do in order to secure data. It takes multiple approaches and methods like the data protection policies, employee training and access controls to create a more well-rounded approach to data security.
-Jacob.
Jacob Mannon
ParticipantJason,
I like that you mentioned training employees to recognize scams. My current company sends out monthly scam emails to the staff to test and see whether or not we recognize them and report them to the I.T. department as phishing or scam emails. I feel that many staff in many companies do not check their email on a regular enough basis to even know whether or not they are receiving spam emails.
-Jacob
Jacob Mannon
ParticipantWhen it comes to making sure we have a strong security program there are different policies we need to consider. Classifying our data is an important policy to have. Security objectives of the company and compliance standards are also necessary to keep data secure. An access control policy will be necessary. We do not want just anyone to have access to all of the company’s data. We also need to ensure that we have strong password requirements for the network. We will also need to have an incident response policy to keep operations flowing in the event of issues arising.
-Jacob.
Jacob Mannon
ParticipantToday we face many issues such as cyberattacks, phishing, vulnerabilities in software, insider threats, ransomware, malware, and many others. We can do our best to lower the risks in our company and reduce vulnerabilities with things like multi-factor authentication, security awareness trainings, encryption, utilization of the least privilege principle, DLP strategies and penetration testing on our software. Nothing in life is perfect, but we can try and lower risk where we can and make our companies safer and more secure.
-Jacob
Jacob Mannon
ParticipantTemptation of sin is the biggest struggle that all people go through. There are times when I feel like giving in, but then I remember the things in my life that the Lord has brought me through. Knowing that the Lord is with me when I am struggling helps to overcome temptation. Psalm 23 is a great reminder that the Lord is with us in our best times as well as our worst. He is our guide and teacher. He is the One who brings us restoration. Even when we may be struggling to a point death, He is still with us. These lessons from Psalm 23 are things that I keep in mind when I personally struggle.
-Jacob
Jacob Mannon
ParticipantAmy,
I think you did a good job explaining cryptographic keys. I like your example of emails. It seems that phishing and email scams are so common now that having encrypted emails is almost a must. Everyone has to protect their data and web usage, so encryption is an excellent tool to have.
-Jacob
Jacob Mannon
ParticipantBraden,
I think you did a great job covering access controls. I like the idea of Role Based Access Control since not everyone in a company needs access to all of the available resources. An HR personnel member isn’t going to need access to patient medical records in a hospital, so having role-based access in place is a phenomenal idea.
-Jacob
Jacob Mannon
ParticipantCryptography is incredibly valuable because it allows for us to take data and hide it while it is moving from one place to another. The value is that it is scrambled or moved around and then sent to its destination where it can then be turned back into its original message. The point of this is to help prevent attackers from stealing data from the network while it is in transit. The main types of encryptions are symmetric, asymmetric, and data hashing. The differences are that symmetric will use the same key that was used to encrypt the message to decrypt it. Asymmetric encryption will require two different keys to decrypt the data. Hashing is where a piece of data is put through an algorithm and is then sent to its destination.
-Jacob
Jacob Mannon
ParticipantWhen it comes to securing company data, there are multiple approaches that can be taken depending on the situation. A secure coding principle known as least privilege is a good example. We want to limit access to data and applications to those who should have an actual need to access them. Encrypting our data is another good control to protect data. Making sure that our applications, OS and security software are all updated to the newest version can help secure data. Having policies in place to protect data is necessary and useful because we don’t want account information available for everyone. I don’t want my banking information to be easily accessible to the public, so the bank has to make sure that my password protected account is not accessible by anyone other than me. This same principle can be applied to Intel. Intel doesn’t want AMD or other companies to know what their latest projects are for the newest CPUs, so they protect their information so that hackers don’t steal their products.
-Jacob
Jacob Mannon
Participant2 Chronicles 7:14 “and if My people who are called by My name humble themselves and pray and seek My face and turn from their wicked ways, then I will hear from heaven, forgive their sin, and heal their land.” God teaches us in the Old Testament that if we depend on His strength and power and not our own, we will be forgiven and healed. In order to do that we need to humble ourselves and repent of our sins and accept Jesus as our savior.
-Jacob.
Jacob Mannon
ParticipantBraden,
I think you did a good job discussing security controls. I like firewalls and would like to learn more about proxy servers. Using a server to prevent you from getting direct access to the websites you utilize seems helpful in preventing unwanted viruses.
-Jacob
Jacob Mannon
ParticipantBraden,
I think you did a great job covering different storage methods. I think RAM storage is very important to consider when looking at a new computer. I was working on my mother in law’s computer recently and it appeared to have a virus that was using all of the system’s RAM. It was to the point that the computer took several minutes to load simple things like google chrome. The computer only had 8 gigabytes of RAM available to start with. I personally think 16 to 32 gigabytes of RAM is a good amount to have. You should be able to complete the majority of your tasks without the computer slowing down.
-Jacob
Jacob Mannon
ParticipantTwo of the biggest network controls that come to mind are encryption and firewalls. Requiring access to the network will help put a barrier between just anyone with an internet connection and those who are actually supposed to be on the network. Firewalls are a good way to filter through any potential malware or attacks to the network. The firewall essentially acts as a filter and allows what data is supposed to come through while preventing data that shouldn’t. These methods are beneficial to companies to help protect information on the network and prevent business losses due to technical issues and possible attacks. These are great ways to lower risk to a more acceptable level.
-Jacob.
Jacob Mannon
ParticipantSome of the most common methods for storing data include direct attached storage, network attached storage, storage area network, and cloud storage. Direct attached storage would be used for immediate access to data. This would be like the hard drive on our computer. We have immediate access to it because it is stored on the device. Network attached storage is data that is kept within a network and requires access. Storage area networks are multiple devices that contain the data. This could be used in a RAID setup across multiple servers. Cloud storage is data kept in a cloud server. Examples of these would be ICloud, Oracle, and Microsoft Onedrive.
-Jacob
-
AuthorPosts